Search squid archive

Re: Working Squid Configuration, but needs some fat reduction

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 19/02/2012 5:42 a.m., ALAA MURAD wrote:
Dear Amos ,

Thanks again for your continues support. I hope at the end of this we
can have a complete and a simple configuration for everyone that want
to have a simple secure reverse proxy.

I always like to do things the right way, but the SSL is the only
thing standing in my way. I really don't like the
'sslflags=DONT_VERIFY_PEER' either  but removing it causing many
problems.

As you can see from
https_port 443 cert=C:/Interceptor/cert/baj.cert key=C:/Interceptor/cert/baj.key

Those are the OpenSSL Pem conversion for my actual domain certificate,
I did also generate a pem for the CA, and tried all possible
combination of capath , cafile, clientca&  sslproxy_capath to insert
this certificate CA but without success (getting different errors)

Nono. The root CA are installed into OpenSSL directly. See the google links below.


So as you said "Without it Squid attempts to validate the peer SSL
certificate against the root CA Squid (via the openssl library)
trusts." I'm not sure what is the connection between the two , I do
have OpenSSL installed but only for conversion of the certificates
(from cert, to pem) (Not even installed on my production squid !).

Openssl libraries (libssl ?) are what do all the work. The squid.conf settings are just telling Squid what to send to openSSL for each type of SSL connection: client connections (http_port), server connections (sslproxy_*) and peer connections (cache_peer).




My question, how to add the CA cert to OpenSSL or Squid ?

There seems to be a few tutorials on it:
  http://www.google.com/search?q=add+a+custom+CA+to+openssl


Amos


[Index of Archives]     [Linux Audio Users]     [Samba]     [Big List of Linux Books]     [Linux USB]     [Yosemite News]

  Powered by Linux